Access your Pro+ Content below.
Security Readers' Choice Awards 2012: Your picks for the best security products
In this issue, find out who won this year's Readers' Choice Awards. More than 2,100 readers participated this year, rating the best security products in 14 categories. The issue also features an article by Diana Kelley of SecurityCurve, who examines threat management best practices implemented at several enterprise organizations. SearchSecurity.com News Director Rob Westervelt analyzes the impact of hacktivists on the threat landscape, and we debut a new column by security experts at Iowa State University on security education and training.
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories.
A successful threat management program requires effective processes, layered technology and user education.
With their goal of damaging corporate reputations, hacktivists aren't your average cybercriminals.
Security researchers are finding more malware that attacks multiple operating systems.
Columns in this issue
Companies are under pressure to take advantage of big data analytics but they should be aware of the risks.
Unless security is viewed as a core function instead of an add-on, we're bound to repeat the mistakes of the past.
In the wake of recent exploits, experts recommend disabling the programming language but that can be tricky in the enterprise.